April 20, 2014

Data Governance for Regulated Industries
Securely and cost-effectively managing petabytes of data from siloed systems is both a threat and opportunity for banking, healthcare, and other organizations in highly regulated industries. Technology advancements and the changing economics of storage and compute have made it possible to leverage this data to do more far-reaching and sophisticated analysis. However, sweeping changes to privacy and transparency laws have heightened the importance of data governance.


Shiny Objects and the Senior Management Team
Effective management teams learn to recognize the signs of a breakdown in discipline and they redouble their efforts to promote clarity and minimize the tendency to fill ambiguity with unqualified activities. These groups recognize the dangers of hubris born of success (Jim Collins) or the tendency to flail in search of quick answers when things go wrong. They understand that they are accountable for setting direction and ensuring that each and every choice to apply company resources must create the right kind of value. And they accept that determining just what the right kind of value truly is, is an exercise that can only be resolved through debate and deliberation.


How to Detect Criminal Gangs Using Mobile Phone Data
Criminal networks are just as social as friendship or business networks. So the same techniques that can tease apart the links between our friends and colleagues should also work for thieves, drug dealers, and organized crime in general. But how would your ordinary law enforcement officer go about collecting and analyzing data in this way? Today, we get an answer thanks to the work of Emilio Ferrara at Indiana University in Bloomington and a few pals. These guys have created a bespoke software platform that can bring together information from mobile phone records, from police databases and from the knowledge and expertise of agents themselves to recreate detailed networks behind criminal organizations.


Dynamic Generation of Client Proxy at Runtime in WCF using a Single Factory
In conventional method, if client proxy for a WCF service is required to be generated at runtime programmatically, an instance of ChannelFactory (generic type) is created passing the interface type of the service (contract) as parameter to the generic class. This requires different implementation for different services for generating client proxy which reduces the generic scope. This article describes a method to create a factory class which generates client proxy at runtime from the type of the service contract received as parameter. This will eliminate separate implementation requirement by using a single factory class with the help of .NET reflection.


The dilution of enterprise-architecture
SA is a job title used by systems integrators in the bid, and sometimes delivery phase. The person responsible for solution outline or high-level design. Must join everything up into a coherent solution architecture, identify and mitigate all manner of technical risks, with the delivery time and cost in mind. EA is a job title used by people for the manager, leader or member of a strategic and cross-organisational function, responsible for optimisation of the enterprise system estate. Often, the job is described as requiring engagement with senior executives and their strategies.


6 Top Information Governance Certifications: Don’t Have One? Well You Should
There are numerous information governance certifications you can get to advance your career. Depending on the professional value of each certification, how long it takes to complete it, the cost and the level of difficulty, some certifications might be more necessary for you than others. After learning more about your options, including the popular certifications below, you can be a better judge of what will suit your needs and professional goals.


Biometric identification that goes beyond finger prints
The past few years have seen a great biometric leap forward, as the saturation of smartphones and biotech advances have expanded the universe of potential biomarkers and applications. It's not just the iPhone 5's fingerprint sensors or Fujitsu's plan to embed a palm vein scanner into its mobiles. We're talking scanning the irises of all 1.2 billion Indians, as well as long-range iris scans, gait-recognition systems that use your smartphone's accelerometer to identify you while you pace, electrocardiogram wristbands rigged to open your door and, yes, the butt and body odor scans. Some applications raise amusing reliability questions: How effective would a body odor ID system be if you were to eat a lot of garlic or wear a new perfume?


The data platform for a new era
At the event we celebrated the launch of SQL Server 2014. With this version we now have in-memory capabilities across all data workloads delivering breakthrough performance for applications in throughput and latency. Our relational database in SQL Server has been handling data warehouse workloads in the terabytes to petabyte scale using in-memory columnar data management. With the release of SQL Server 2014, we have added in-memory Online Transaction Processing. In-memory technology has been allowing users to manipulate millions of records at the speed of thought, and scaling analytics solutions to billions of records in SQL Server Analysis Services.


Cisco and Microsoft SQL Server 2014
Cisco and Microsoft, with our strategic storage partners EMC and NetApp, have worked to create Cisco Validated Designs built on Microsoft reference architectures. All solutions and reference architectures are field tested and validated with a primary objective to help simplify implementation and the deployment of Microsoft SQL Server workloads on Cisco UCS. Our integrated infrastructures with our partner EMC are banded ‘VSPEX’ while our solutions with our partner NetApp are branded ‘FlexPod’. With the release of SQL Server 2014, our inventory of SQL Server solutions will grow as we bring to market in spring 2014 reference architectures to support consolidation and high availability scenarios.


Nashorn - The Combined Power of Java and JavaScript in JDK 8
Starting with the JDK 8 Nashorn replaces Rhino as Java’s embedded JavaScript engine. Nashorn supports the full ECMAScript 5.1 specification plus some extensions. It compiles JavaScript to Java bytecode using new language features based on JSR 292, including invokedynamic, that were introduced in JDK 7. This brings a 2 to 10x performance boost over the former Rhino implementation, although it is still somewhat short of V8, the engine inside Chrome and Node.js. If you are interested in details of the implementation you can have a look at these slides from the 2013 JVM Language Summit.



Quote for the day:

"When you have exhausted all possibilities, remember this: You haven't." -- Thomas Edison

No comments:

Post a Comment